Computer Networking
Which of the following technique is used for Time-To-Line (TTL)?

None of these
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
a technique used in best-effort delivery system to avoid endlessly looping packets.
All of these
One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
What is route poisoning?

It sends back the protocol received from a router as a poison pill, which stops the regular updates.
It prevents regular update messages from reinstating a route that has just come up.
It is information received from a router that can't be sent back to the originating router.
It describes when a router sets the metric for a downed link to infinity.

ANSWER DOWNLOAD EXAMIANS APP